Solved

isa server

Posted on 2007-04-05
7
466 Views
Last Modified: 2013-11-16
I have a ISA server2000 that uses wbsense for email filtering, under ISA for the 1 server that we have i have the option checked off for requiring user authentication for users that browse the internet becuase under sessions it said for each user was anynoumous and we wanted it to post the user name so i checked off that box to have users authenticate well now it is screwing with our programmers ability to publish web pages here is the error they receive System.Net.WebException: The request failed with HTTP status 407: Proxy Authentication Required ( The ISA Server requires authorization to fulfill the request. Access to the Web Proxy service is denied.  ).

 

Is what we were getting yesterday as for the publishing failure I have no idea.


this is a in-house program called CMPRO and it is trying to access IIS on another server when it gets this error?
0
Comment
Question by:scripttron75
  • 3
  • 2
7 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 18860069
Do you have the ISA firewall client installed on the workstations? Are you using ISA in proxy, firewall or integrated mode?
0
 

Author Comment

by:scripttron75
ID: 18860294
integrated mode with websense
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 18860420
Do you have the ISA firewall client installed on the workstations
0
 

Author Comment

by:scripttron75
ID: 18860593
no we do not, we use some xp workstations and wyse terminals
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 18860880
So the clients are all securenat?  ie the default gateway on the clients etc are pointing to the ISA internal nic ip? In that fashion, you have no way of performing authentication out side of the all users and the check box. The ISA client provides that funtion instead; as a test, install the isa client on one PC and try it. Think you will be pleased with the results.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
Common practice undertaken by most system administrators is to document the configurations and final solutions of anything performed by them for their future use and reference. So here I am going to explain how to export ISA Server 2004 Firewall pol…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now